Which Behaviors Break HIPAA? Practical Checklist with Real-World Examples and Remedies

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Which Behaviors Break HIPAA? Practical Checklist with Real-World Examples and Remedies

Kevin Henry

HIPAA

September 20, 2024

8 minutes read
Share this article
Which Behaviors Break HIPAA? Practical Checklist with Real-World Examples and Remedies

HIPAA protects the privacy and security of Protected Health Information (PHI). This guide shows you which behaviors break HIPAA and how to prevent them, using practical checklists, real-world examples, and clear remedies you can act on today. It supports your confidentiality obligations, Security Incident Response, Risk Assessment Procedures, and, when necessary, Data Breach Notification.

Unauthorized Access to PHI

Accessing a patient’s record without a job-related need violates the Minimum Necessary Standard and your confidentiality obligations. “Snooping,” sharing logins, or viewing a family member’s chart are classic examples that trigger audits, sanctions, and potential breach determinations.

Practical checklist

  • Apply the Minimum Necessary Standard: only open records required for your role and task.
  • Use unique credentials; never share passwords or use generic accounts.
  • Enable Access Control Mechanisms: role-based access, multi-factor authentication, and automatic logoff.
  • Review audit logs routinely and investigate anomalous access promptly.
  • Require “break-glass” justifications with real-time alerts and retrospective review.

Real-world examples

  • A staff member looks up a neighbor’s lab results out of curiosity.
  • Team members use a shared “front-desk” login that masks who actually accessed PHI.
  • A workstation is left unlocked, allowing passersby to open charts.

Remedies

  • Activate Security Incident Response: revoke access, preserve logs, and document the incident.
  • Run Risk Assessment Procedures to determine whether PHI was compromised and if a breach occurred.
  • If a breach is confirmed, complete Data Breach Notification; sanction involved workforce and expand monitoring.
  • Harden Access Control Mechanisms and re-train staff on the Minimum Necessary Standard.

Loss or Theft of Unencrypted Devices

Laptops, tablets, smartphones, or USB drives that store ePHI and lack strong encryption create a high-risk exposure. Theft from vehicles or loss during travel frequently leads to reportable breaches.

Practical checklist

  • Enforce full-disk encryption and strong device unlock (PIN/biometric) via mobile device management.
  • Enable remote lock/wipe, geolocation, and automatic screen timeout.
  • Prohibit local PHI storage; use secure clinical apps with server-side storage and encrypted backups.
  • Maintain an asset inventory with custody tracking and rapid deprovisioning.

Real-world examples

  • A clinician’s unencrypted laptop is stolen from a car after a home visit.
  • A misplaced thumb drive contains discharge summaries for multiple patients.
  • A lost phone syncs email with unprotected PHI attachments.

Remedies

  • Trigger Security Incident Response: attempt remote wipe, change credentials, and disable device access.
  • Perform Risk Assessment Procedures focused on encryption status, data stored, and likelihood of access.
  • Complete Data Breach Notification if you cannot reasonably rule out unauthorized viewing.
  • Tighten policies: encryption by default, no removable media for PHI, and secure alternatives for data transfer.

Improper Disposal of PHI

Throwing paper records in regular trash, recycling drives without wiping, or returning leased copiers with data intact violates HIPAA. Disposal must render PHI unreadable, indecipherable, and unreconstructable.

Practical checklist

  • Use locked shred bins and cross-cut shredding or certified destruction services with chain-of-custody.
  • Sanitize electronic media (wiping, degaussing, or physical destruction) before reuse or disposal.
  • Document destruction with certificates and maintain retention schedules.
  • Include disposal controls for scanners, copiers, and multifunction printers with local storage.

Real-world examples

  • Boxes of charts are found in an unlocked dumpster behind a clinic.
  • A leased copier is returned; its internal drive still contains scanned records.
  • Wristbands and prescription labels with identifiers end up in public trash.

Remedies

  • Secure the materials immediately and record the chain-of-custody as part of Security Incident Response.
  • Conduct Risk Assessment Procedures; if PHI exposure is likely, proceed with Data Breach Notification.
  • Revise disposal policies, re-train staff, and vet destruction vendors with clear contractual safeguards.

Sharing PHI on Social Media

Posting photos, stories, or “shout-outs” that reveal patient identity or details—even unintentionally—breaks confidentiality obligations. Background whiteboards, wristbands, or timestamps can re-identify patients.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Practical checklist

  • Adopt a zero-PHI Social Media policy; require approvals for any facility-related posts.
  • Never confirm someone is a patient; avoid case descriptions that could identify an individual.
  • Remove metadata from media and prohibit filming in clinical areas without documented authorization.
  • Provide ongoing training with real examples of subtle identifiers.

Real-world examples

  • A celebration selfie includes a monitor showing a patient name and date of birth.
  • A staff member describes a “rare case” with enough specifics to identify the individual.
  • A clinic replies to an online review and discloses the reviewer’s treatment details.

Remedies

  • Take down the content, capture evidence for review, and report via Security Incident Response.
  • Complete Risk Assessment Procedures; if PHI was exposed, perform Data Breach Notification.
  • Strengthen policy enforcement, add pre-post review, and coach staff with targeted refresher training.

Sending PHI to the Wrong Recipient

Misdirected emails, faxes, mailings, or portal messages are common causes of breaches. Autocomplete errors, outdated fax numbers, or mislabeled envelopes can defeat the Minimum Necessary Standard.

Practical checklist

  • Use secure portals or encrypted email for external sharing; enable DLP rules and address validation.
  • Double-check recipients; require a second verification for high-risk faxes and bulk mailings.
  • Use cover sheets that minimize visible PHI; confirm destination numbers before sending.
  • Standardize mailing workflows with barcodes and quality checks at handoff points.

Real-world examples

  • An email with a visit summary goes to a similarly named contact.
  • A fax with labs is sent to a closed clinic’s old number, now owned by another business.
  • Printed after-visit summaries are handed to the wrong patient at checkout.

Remedies

  • Initiate Security Incident Response: attempt recall, contact the unintended recipient, and request secure deletion or return.
  • Document all mitigation steps and complete Risk Assessment Procedures.
  • If risk remains, execute Data Breach Notification and tighten verification controls and staff training.

Lack of Access Controls

Weak or missing Access Control Mechanisms—no unique IDs, no multi-factor authentication, broad “all access,” or no session timeout—invite unauthorized use and hinder accountability.

Practical checklist

  • Implement least-privilege, role-based access with multi-factor authentication and automatic logoff.
  • Provision and deprovision accounts promptly; prohibit shared or generic logins.
  • Enable detailed audit trails and review them; alert on unusual access patterns.
  • Segment systems and restrict administrative privileges to a small, vetted group.

Real-world examples

  • A “nurse” generic account is shared across shifts, making access untraceable.
  • A former employee’s remote access remains active for weeks after termination.
  • Workstations near public areas display PHI without privacy screens.

Remedies

  • Roll out identity governance, periodic access recertification, and just-in-time administrative access.
  • Harden authentication (MFA/SSO), enforce session timeouts, and deploy privacy screens and workstation locks.
  • Audit, sanction, and retrain; verify effectiveness through follow-up testing.

Inadequate Employee Training

When training is infrequent or generic, staff miss practical do’s and don’ts that prevent breaches. People must understand confidentiality obligations, phishing risks, and the Minimum Necessary Standard for daily tasks.

Practical checklist

  • Provide role-based onboarding and annual refreshers with scenario-driven exercises.
  • Run simulated phishing and teach secure handling of email, texts, and messaging apps.
  • Require signed confidentiality acknowledgments and reinforce “need-to-know.”
  • Publish simple, visible Security Incident Response steps for fast reporting.

Real-world examples

  • Staff discuss a patient in an elevator where visitors can overhear.
  • An employee clicks a phishing link and enters credentials into a fake portal.
  • A temp prints entire charts instead of the minimum necessary pages.

Remedies

  • Deliver immediate coaching; use microlearning to address the exact mistake.
  • Update curricula based on incident trends and test comprehension with short quizzes.
  • Recognize positive behaviors and enforce sanctions for repeated violations.

Key takeaways

Behaviors that break HIPAA are predictable and preventable. Apply the Minimum Necessary Standard, deploy strong Access Control Mechanisms, encrypt devices, dispose of PHI securely, verify recipients, and invest in practical training. When incidents happen, move quickly with Security Incident Response, complete Risk Assessment Procedures, and provide Data Breach Notification when required.

FAQs

What constitutes a HIPAA violation?

A HIPAA violation occurs when PHI is used, disclosed, or accessed in a way that violates the Privacy, Security, or Breach Notification Rules. Typical violations include snooping, weak or missing safeguards, misdirected communications, improper disposal, and failures to follow the Minimum Necessary Standard or your confidentiality obligations.

How can unauthorized access to PHI be prevented?

Prevent it with least-privilege, role-based Access Control Mechanisms, unique user IDs, multi-factor authentication, automatic logoff, and privacy screens; continuous audit logging and alerts; workforce training on the Minimum Necessary Standard; sanctions for misuse; and periodic access reviews that remove unnecessary privileges promptly.

What are the consequences of improper disposal of PHI?

Consequences include patient harm (identity theft or embarrassment), regulatory investigations, fines, corrective action plans, contractual exposure, and reputational damage. If records are exposed, you may need to conduct Risk Assessment Procedures and, if a breach is confirmed, complete Data Breach Notification to affected individuals and regulators.

How should incidents of PHI leakage be reported?

Report immediately through your Security Incident Response channels (privacy/security officer or hotline), preserve evidence, and document facts. Complete Risk Assessment Procedures; if a breach is confirmed, send Data Breach Notifications without unreasonable delay (and no later than 60 days of discovery). For large incidents, notify regulators and, when required, the media; log smaller breaches and report them within the required timeframes.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles